General

  • Target

    cc66615528694b36aef5a482dc65cac1b017fbbebfe8b40b409ad0e5ac3247b1

  • Size

    529KB

  • Sample

    241104-q7jg8azmfs

  • MD5

    20d8d3e4ac22b3f425a108860ba65be7

  • SHA1

    8ca180adfeacc7843b50df5dc1d67d6576d44776

  • SHA256

    cc66615528694b36aef5a482dc65cac1b017fbbebfe8b40b409ad0e5ac3247b1

  • SHA512

    f93f6a676f1846fa98e414f4e6257a62f4fde1e98ec966c5f6b9511074014feddd4f81cbc8ae5db3e6b73550548cec8060c0e0aaa7414b56b643ac54066a57b8

  • SSDEEP

    6144:KCy+bnr+Rp0yN90QEhccxdkbq1WA9FFhQMtqJ/YCanOPRFQ49jFiHvbXW6MJeV7h:mMrZy90HfxZWlJ/G3mIHvbTz7h

Malware Config

Extracted

Family

redline

Botnet

rulit

C2

pedigj.eu:4162

Attributes
  • auth_value

    f4df9ef56871d4ac883b282abaf635e0

Targets

    • Target

      cc66615528694b36aef5a482dc65cac1b017fbbebfe8b40b409ad0e5ac3247b1

    • Size

      529KB

    • MD5

      20d8d3e4ac22b3f425a108860ba65be7

    • SHA1

      8ca180adfeacc7843b50df5dc1d67d6576d44776

    • SHA256

      cc66615528694b36aef5a482dc65cac1b017fbbebfe8b40b409ad0e5ac3247b1

    • SHA512

      f93f6a676f1846fa98e414f4e6257a62f4fde1e98ec966c5f6b9511074014feddd4f81cbc8ae5db3e6b73550548cec8060c0e0aaa7414b56b643ac54066a57b8

    • SSDEEP

      6144:KCy+bnr+Rp0yN90QEhccxdkbq1WA9FFhQMtqJ/YCanOPRFQ49jFiHvbXW6MJeV7h:mMrZy90HfxZWlJ/G3mIHvbTz7h

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks